Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

Can you quote this assignment?

1 answer below »
Answered Same Day Oct 12, 2021

Solution

Amit answered on Oct 13 2021
143 Votes
Title of the assignment: Assignment – 2 (Network security)
Student’s name:
Student ID:
Professor’s name:
Course title: COIT20262 T2, 2019
Date: 10/13/2019
Table of Contents
a)    Illustration of network design:    3
)    Security mechanism of MAC address filtering    4
c)    Pros, cons and recommendations for MAC address filtering    4
d)    Requirement of WAP2    5
e)    Password selection with binary and hex values for AES 128    6
f)    Centralized authentication for Wi-Fi devices    6
g)    Separate Wi-Fi for guests and role of SSID    7
h)    VPN configuration for employees    8
i)    Advantages and disadvantages of VPN tunneling protocols    9
j)    VPN setup on system/ mobile    9
k)    Password finding by past employees    11
l)    Recommendations for secured password storage on Linux    11
m)    Recommendations for new password selection    11
n)    References:    13
a) Illustration of network design:
The implementation of VPN, wired and wireless network for local business requires a simulation environment. This simulation environment provides the required devices, AP, routers, switches and easy configuration of VPN. The proposed network illustration for local business developed in Packet tracer simulator is presented underneath:
The wired network of five computers, wireless network with AP router and implementation of servers is presented in this illustration. The allocation of IP to all used devices is also proposed. The router to router encryption is proposed in this illustration and red cable is showing this. The WAP2 encryption can easily be implemented to the wireless devices. The path to server is also secured with encryption.
) Security mechanism of MAC address filtering
The MAC filtering is commonly used to provide security to all the defined access controls with network card based MAC address determined on proposed network. The placement of devices in different lists (Black and white) becomes possible with these unique device addresses and their filtering. The MAC filtering provides security on bases of following:
· The validity of MAC addresses is verified with help of packet analyzer and after verification of valid devices, MAC spoofing is also performed.
· The obscurity based security to network addresses is provided through MAC filtering.
· The isolation of all connected wireless clients is also done through MAC filtering.
· The security of wired devices is maintained with their port addresses.
· The blocking of IP addresses based on invalid MAC address is also done with MAC filtering.
c) Pros, cons and recommendations for MAC address filtering
Maintaining the network security with security of used devices is most important for local business units. The use of MAC address filtering can make identification of valid and invalid network devices. The MAC filtering provides different advantages to network security and some are listed underneath:
· The private VLAN security can be improved through MAC filtering.
· Allowing only the white list devices to make connection through any port is also advantage of MAC filtering.
The implementation of MAC filtering also leads to some cons and some cons of this technique are listed underneath:
· The identification of individual used based on MAC address is not possible with this technique.
· The network entry is only verified for devices not the users.
· If any authorized person is placed in black list, then, any network services are not allowed to him /her.
The effective implementation of MAC filtering is possible with following recommendations:
· Making MAC spoofing essential to all the devices can increase security level.
· Enhancement of security to wired network, wireless network and private VPN is possible with effective use of packet analyzer. It can easily...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here